202 research outputs found

    Comparative analyzes of technological tools between industry 4.0 and smart cities approaches: the new society ecosystem

    Get PDF
    Today the growth of modern cities is unprecedented in the history of urbanization and the urban environmental problems have also been increased. Unfortunately, there is no much time to modify past failures and improve the status quo, and ensure the protection of the environment. Consequently, it’s important to pay attention to the development of sustainable urban planning and its role in urban management issues is an objective that requires a new approach.On the other hand, Industry 4.0 (I.4.0), as called the 4th Industrial Revolution, carries impacts in the production on companies, the economy and society, with disruptive character, creating new markets and destabilizing the traditional way of doing business. Once I.4.0 is a strategic approach to the integration of advanced control systems with internet technology, enabling communication between people, products and complex systems, it’s expected to follow the same in the Smart Cities development.This article aims to relate technological tools of I.4.0 and the dimensions of “Smart Cities”, based on analytical framework for better understanding the emergence of new society ecosystem focused on the redefinition of the cities’ concept, urbanism and way of life, motivated by this new reconfiguration

    Emerging Communication Technologies (ECT) Phase 4 Report

    Get PDF
    The Emerging Communication Technology (ECT) project investigated three First Mile communication technologies in support of NASA s Crew Exploration Vehicle (CEV), Advanced Range Technology Working Group (ARTWG), and the Advanced Spaceport Technology Working Group (ASTWG). These First Mile technologies have the purpose of interconnecting mobile users with existing Range Communication infrastructures on a 24/7 basis. ECT is a continuation of the Range Information System Management (RISM) task started in 2002. This is the fourth year of the project

    The Network-on-Chip Paradigm in Practice and Research

    Get PDF
    The network-on-chip paradigm is an emerging paradigm that effectively addresses and presumably can overcome the many on-chip interconnection and communication challenges that already exist in today's chips or will likely occur in future chips. Effective on-chip implementation of network-based interconnect paradigms requires developing and deploying a whole new set of infrastructure IPs and supporting tools and methodologies. This special issue illustrates how, to date, engineers have successfully deployed NoCs to meet certain very-aggressive specifications. At the same time, the articles reveal many issues and challenges that require solutions if the NoC paradigm will indeed become a panacea or quasi-panacea for tomorrow’s SoCs

    Computer based simulation of optical wireless communications for the development of optimized error protection and correction schemes

    Get PDF
    Commercial application of optical wireless communications is currently limited to the area of short range near ground connections, like networks between buildings over a few kilometers. For other areas of application, like data downlinks from flying platforms, demonstrations have been done, but commercial systems for long range communications over many kilometers are not yet available for general usage. The biggest challenge for reliable optical communications is to mitigate the fading of the received optical signal. A possible solution is to implement error protection and correction mechanisms for securing transmitted data. In this dissertation a simplified channel model is developed which can be used for computer based simulation. This simplified channel model is then used for the evaluation of error protection and correction mechanisms applied to the optical wireless channel. Finally generally proposed communication scenarios are evaluated if optical wireless communication is possible, based on the developed channel model. The results show that the combination of forward error correction and selective repeat automatic repeat request protocols can be used to realize reliable optical communication links in all proposed scenarios, even the most challenging ones. The back channel traffic for automatic repeat request protocols leads to a significant reduction of the transmittable user data rate in worst-case scenarios and has to be taken into account for the system design. The developed simulation approach can be used to optimize protocols for the optical wireless channel in order to reduce the load on the back channel and the over all required memory.Die kommerzielle Anwendung der optischen Freiraumkommunikation ist gegenwärtig auf den Bereich der bodennahen Kurzstreckenverbindungen mit wenigen Kilometern Länge begrenzt, beispielsweise Netzwerkverbindung zwischen Gebäuden. In anderen Anwendungsbereichen, z.B. Datendownlinks von fliegenden Plattformen, wurden zwar Technologiedemonstrationen durchgeführt, jedoch sind für solche Langstreckenverbindungen keine alltagstauglichen kommerziellen Systeme verfügbar. Die größte Herausforderung für zuverlässige optische Kommunikation ist die Kompensation der Signalschwankungen des empfangenen optischen Signals. Eine mögliche Lösung für dieses Problem ist die Implementierung von Fehlersicherungs- und Fehlerkorrekturmechanismen, um die Datenübertragung abzusichern. In dieser Dissertation wird ein vereinfachtes Kanalmodell entwickelt, welches für die Simulationen mittels Computern geeignet ist. Dieses vereinfachte Modell wird anschließend für die Bewertung von Fehlersicherungs- und Fehlerkorrekturmechanismen für den optischen Kanal verwendet. Abschliessend wird basierend auf dem entwickelten Kanalmodell der mögliche Einsatz von optischer Freiraumkommunikation in häufig vorgeschlagenen Szenarien untersucht. Die Ergebnisse zeigen, dass die Kombination von Vorwärtsfehlerkorrektur und Protokollen mit selektiver Wiederholung und automatischer Wiederholungsanfrage geeignet ist, um zuverlässige optische Kommunikationsverbindungen in allen vorgeschlagenen Szenarien zu realisieren, selbst in den anspruchsvollsten. Die Datenübertragung auf dem Rückkanal von Protokollen mit automatischer Wiederholungsanfrage führt im schlechtesten Fall zu einer signifikanten Reduzierung der übertragbaren Nutzdatenrate und muss bei der Systemauslegung berücksichtigt werden. Mit dem entwickelten Simulationsansatz können Protokolle für den optischen Funkkanal optimiert werden, um die Belastung des Rückkanals zu reduzieren und um den allgemeinen Speicherbedarf zu reduzieren

    SpineData – A Danish clinical registry of people with chronic back pain

    Get PDF
    Background: Large-scale clinical registries are increasingly recognized as important resources for quality assurance and research to inform clinical decision-making and health policy. We established a clinical registry (SpineData) in a conservative care setting where more than 10,000 new cases of spinal pain are assessed each year. This paper describes the SpineData registry, summarizes the characteristics of its clinical population and data, and signals the availability of these data as a resource for collaborative research projects. Methods: The SpineData registry is an Internet-based system that captures patient data electronically at the point of clinical contact. The setting is the government-funded Medical Department of the Spine Centre of Southern Denmark, Hospital Lillebaelt, where patients receive a multidisciplinary assessment of their chronic spinal pain. Results: Started in 2011, the database by early 2015 contained information on more than 36,300 baseline episodes of patient care, plus the available 6-month and 12-month follow-up data for these episodes. The baseline questionnaire completion rate has been 93%; 79% of people were presenting with low back pain as their main complaint, 6% with mid-back pain, and 15% with neck pain. Collectively, across the body regions and measurement time points, there are approximately 1,980 patient-related variables in the database across a broad range of biopsychosocial factors. To date, 36 research projects have used data from the SpineData registry, including collaborations with researchers from Denmark, Australia, the United Kingdom, and Brazil. Conclusion: We described the aims, development, structure, and content of the SpineData registry, and what is known about any attrition bias and cluster effects in the data. For epidemiology research, these data can be linked, at an individual patient level, to the Danish population-based registries and the national spinal surgery registry. SpineData also has potential for the conduct of cohort multiple randomized controlled trials. Collaborations with other researchers are welcome

    Enhanced online programming for industrial robots

    Get PDF
    The use of robots and automation levels in the industrial sector is expected to grow, and is driven by the on-going need for lower costs and enhanced productivity. The manufacturing industry continues to seek ways of realizing enhanced production, and the programming of articulated production robots has been identified as a major area for improvement. However, realizing this automation level increase requires capable programming and control technologies. Many industries employ offline-programming which operates within a manually controlled and specific work environment. This is especially true within the high-volume automotive industry, particularly in high-speed assembly and component handling. For small-batch manufacturing and small to medium-sized enterprises, online programming continues to play an important role, but the complexity of programming remains a major obstacle for automation using industrial robots. Scenarios that rely on manual data input based on real world obstructions require that entire production systems cease for significant time periods while data is being manipulated, leading to financial losses. The application of simulation tools generate discrete portions of the total robot trajectories, while requiring manual inputs to link paths associated with different activities. Human input is also required to correct inaccuracies and errors resulting from unknowns and falsehoods in the environment. This study developed a new supported online robot programming approach, which is implemented as a robot control program. By applying online and offline programming in addition to appropriate manual robot control techniques, disadvantages such as manual pre-processing times and production downtimes have been either reduced or completely eliminated. The industrial requirements were evaluated considering modern manufacturing aspects. A cell-based Voronoi generation algorithm within a probabilistic world model has been introduced, together with a trajectory planner and an appropriate human machine interface. The robot programs so achieved are comparable to manually programmed robot programs and the results for a Mitsubishi RV-2AJ five-axis industrial robot are presented. Automated workspace analysis techniques and trajectory smoothing are used to accomplish this. The new robot control program considers the working production environment as a single and complete workspace. Non-productive time is required, but unlike previously reported approaches, this is achieved automatically and in a timely manner. As such, the actual cell-learning time is minimal

    User-Centric Security and Privacy Mechanisms in Untrusted Networking and Computing Environments

    Get PDF
    Our modern society is increasingly relying on the collection, processing, and sharing of digital information. There are two fundamental trends: (1) Enabled by the rapid developments in sensor, wireless, and networking technologies, communication and networking are becoming more and more pervasive and ad hoc. (2) Driven by the explosive growth of hardware and software capabilities, computation power is becoming a public utility and information is often stored in centralized servers which facilitate ubiquitous access and sharing. Many emerging platforms and systems hinge on both dimensions, such as E-healthcare and Smart Grid. However, the majority information handled by these critical systems is usually sensitive and of high value, while various security breaches could compromise the social welfare of these systems. Thus there is an urgent need to develop security and privacy mechanisms to protect the authenticity, integrity and confidentiality of the collected data, and to control the disclosure of private information. In achieving that, two unique challenges arise: (1) There lacks centralized trusted parties in pervasive networking; (2) The remote data servers tend not to be trusted by system users in handling their data. They make existing security solutions developed for traditional networked information systems unsuitable. To this end, in this dissertation we propose a series of user-centric security and privacy mechanisms that resolve these challenging issues in untrusted network and computing environments, spanning wireless body area networks (WBAN), mobile social networks (MSN), and cloud computing. The main contributions of this dissertation are fourfold. First, we propose a secure ad hoc trust initialization protocol for WBAN, without relying on any pre-established security context among nodes, while defending against a powerful wireless attacker that may or may not compromise sensor nodes. The protocol is highly usable for a human user. Second, we present novel schemes for sharing sensitive information among distributed mobile hosts in MSN which preserves user privacy, where the users neither need to fully trust each other nor rely on any central trusted party. Third, to realize owner-controlled sharing of sensitive data stored on untrusted servers, we put forward a data access control framework using Multi-Authority Attribute-Based Encryption (ABE), that supports scalable fine-grained access and on-demand user revocation, and is free of key-escrow. Finally, we propose mechanisms for authorized keyword search over encrypted data on untrusted servers, with efficient multi-dimensional range, subset and equality query capabilities, and with enhanced search privacy. The common characteristic of our contributions is they minimize the extent of trust that users must place in the corresponding network or computing environments, in a way that is user-centric, i.e., favoring individual owners/users
    • …
    corecore